OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Container security: Precaution levels, mitigation strategies, and research perspectives
Devi Priya V S, Sibi Chakkaravarthy Sethuraman, Muhammad Khurram Khan
Computers & Security (2023) Vol. 135, pp. 103490-103490
Closed Access | Times Cited: 8

Showing 8 citing articles:

AI Assisted Energy Optimized Sustainable Model for Secured Routing in Mobile Wireless Sensor Network
Khalid Haseeb, Fahad F. Alruwaili, Atif Khan, et al.
Mobile Networks and Applications (2024)
Closed Access | Times Cited: 2

Waste Service Retribution Management in Selayar Islands Regency through Website-Based Solutions
Wisda Wisda, Nuraida Latif, Rezki Apriana, et al.
Ceddi Journal of Information System and Technology (JST) (2024) Vol. 3, Iss. 1, pp. 1-13
Open Access | Times Cited: 1

Platform as Service for Data Analysis Suppoted by Computational Intelligence Techniques
Yosvany Márquez Ruíz, Iliana Pérez Pupo, Pedro Yobanis Piñero Pérez, et al.
Studies in computational intelligence (2024), pp. 189-211
Closed Access

A Secure Container Placement Algorithm Based on Microservice Invocation Criticality
Mingyang Li, Hongchao Hu, Wenyan Liu
(2024), pp. 234-240
Closed Access

A Few to Unveil Them All: Leveraging Mixture of Experts on Minimal Data for Detecting Covert Channels in Containerized Cloud Infrastructures
Luca Caviglione, Massimo Guarascio, Francesco Sergio Pisani, et al.
(2024), pp. 731-739
Closed Access

A Container Escape Detection Method Based on a Dependency Graph
Kai Chen, Yufei Zhao, Jing Guo, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4773-4773
Open Access

Exploit Mitigation in Docker Containers Using Plain Text Files
Nelly-Janeth Yuquilema-Heredia, Raúl Humberto Cuzco Naranjo, Willian-Xavier Sanchez-Labre, et al.
Lecture notes in networks and systems (2024), pp. 813-829
Closed Access

Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint)
Taha Gharaibeh, Steven S. Seiden, Mohamed Abouelsaoud, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-11
Closed Access

Page 1

Scroll to top